• Title/Summary/Keyword: Internet Advertisement

Search Result 267, Processing Time 0.02 seconds

Development of Internet Advertising Method based on Text Keyword according to Mouse Action (마우스의 움직임에 따른 텍스트 키워드 기반 인터넷광고기법 개발)

  • 진교홍;이혜원
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1691-1697
    • /
    • 2003
  • The Internet is standing in the spotlight of a new medium of advertisement with explosive growth of market share of electronic commerce, several Internet advertising methods have been implemented. Among them, the banner advertising method is typically being used in the Internet, but the users are not willing to see the banner advertising, moreover that method shows low click rate. Accordingly we propose a new Internet advertising method that makes expose advertising content according to proper text keyword in the article of web pages. During user is reading a article of web page, when user puts mouse pointer over a text keyword, previously specified advertising content is appeared on the web page. The proposed method is based on the keyword advertising, and unlike banner advertising, various shape of images can be applied. Also whole web page could be used for advertising area, and the method does not affect loading delay time of web page.

Monitoring of On-Line Nutrition Information-Analysis of Meta Data (인터넷 영양정보의 모니터링-메타데이터의 분석)

  • 강혜경;강명희;유경혜;이선영
    • Journal of Nutrition and Health
    • /
    • v.37 no.8
    • /
    • pp.688-700
    • /
    • 2004
  • This study was conducted to analyze how appropriate the on-line nutrition information was externally as a web information. Four-hundred-ninety-seven web sites from 5 internet search engines (Yahoo, Empas, Nate, Hanmir, Naver) were selected on the basis of April 25th, 2004. The skillful personnels monitored them about 8 evaluating categories: clarity, purpose, authority, durability, advertisement, privacy and/or security, responsibility, and contents. Forty percent of the selected web sites were operated by the companies which had commercial purpose like internet shopping malls and 5.6% by academies, societies, research institutions, schools/colleges and public institutions. Most of web sites (76.1 %) were managed for advertisements and sales of companies' commodities, and 32.6% had the food and nutrition information as first purpose. Ninety-three percent of web sites were targeted to healthy individuals through whole life cycle. Specifically, there were lots of web sites for the obesity which were offered by diet related companies. Of the 497 web sites, 193 mentioned the name providing the nutrition information, but only 1/3 had reliability on their specialty. As a source of nutrition information, 52.7% of web sites were using 'books of the major field' and 42.0% 'newspapers' and 23.7% 'broadcasting', respectively. Most web sites mentioned 'setting-up date' but not 'renewal date'. Thirty-six percent of web sites took '2 - 3 days' for the operators to answer the questions through the bulletin. Forty-seven percent of web sites answered' 1 - 10 questions' per 1 week, but 40.1 % of them didn't answer for a week at all. There were 118 web sites (23.7%) to record the connected frequencies and 36.0% of them put the advertisements. Around 96% of web sites mentioned feedback addresses. Among the menus of web sites, 68.0% were about self-advertisement and 64.0% about nutrition information. Each web site was scored to judge its external quality according to the operators by selecting 13 items. Web sites managed by public institution had highest scores (9.5), and lowest in private vendors', food companies' and individual web pages. Among search engines, Naver got the highest score of 7.0 and Nate the lowest one of 6.1. As it was only the pilot study, there were several limits in evaluating tools, time and monitored quantity. To make monitoring of on-line nutrition informatiions actively, standardized monitoring forms might be developed under the integrated studies.

Flush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.184-194
    • /
    • 2010
  • Ethernet ring protection (ERP) technology, which is defined in ITU-T Recommendation G.8032, has been developed to provide carrier grade recovery for Ethernet ring networks. However, the filtering database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. This traffic overshooting is especially critical when a ring provides services to a large number of clients. According to our experimental results, the traditional FDB flush requires a link capacity about sixteen times greater than the steady state traffic bandwidth. This paper introduces four flush optimization schemes to resolve this issue and investigates how the proposed schemes deal with the transient traffic overshoot on a multi-ring network under failure conditions. With a network simulator, we evaluate the performance of the proposed schemes and compare them to the conventional FDB flush scheme. Among the proposed methods, the extended FDB advertisement method shows the fastest and most stable protection switching performance.

IoT Compliant HD Digital Signage Controller Design using Raspberry Pi

  • Yang, Seungyoun;Shin, Jaekwon;Lee, Sunghwa;Kim, Jintae
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.18-21
    • /
    • 2017
  • In this paper we present IoT compliant HD Digital Signage Controller design using Raspberry Pi. Nowadays, the digital signage system have gained increasing popularity and rapidly growing communications medium that offers a wide range of exciting ways with customers, enhance brand awareness, increase sales and margin uplift by replacing the traditional static signage system. This paper presents a cost-effective IoT based HD Digital Signage Controller (DSC) using R-Pi computer that can use various kinds of displays in order to make the system as efficient and affordable as possible to provide advertisement or other relevant information to people in public areas. The system is designed in such way the information about surrounding related place is taken through sensors and directly uploaded to the internet, and thus can be accessed anytime and displayed on screens by using Raspberry Pi that serves as controller in the system. The design and implementation of the system developed by using python programming language and its hardware consists of sensors, Arduino, Raspberry Pi 3 model B board and the displays. The main targets of this study are build a cost effective Digital Signage system as well as broadcasting information at display contents in public areas and control those digital signs.

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

Clustering-Based Mobile Gateway Management in Integrated CRAHN-Cloud Network

  • Hou, Ling;Wong, Angus K.Y.;Yeung, Alan K.H.;Choy, Steven S.O.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.2960-2976
    • /
    • 2018
  • The limited storage and computing capacity hinder the development of cognitive radio ad hoc networks (CRAHNs). To solve the problem, a new paradigm of cloud-based CRAHN has been proposed, in which a CRAHN will make use of the computation and storage resources of the cloud. This paper envisions an integrated CRAHN-cloud network architecture. In this architecture, some cognitive radio users (CUs) who satisfy the required metrics could perform as mobile gateway candidates to connect other ordinary CUs with the cloud. These mobile gateway candidates are dynamically clustered according to different related metrics. Cluster head and time-to-live value are determined in each cluster. In this paper, the gateway advertisement and discovery issues are first addressed to propose a hybrid gateway discovery mechanism. After that, a QoS-based gateway selection algorithm is proposed for each CU to select the optimal gateway. Simulations are carried out to evaluate the performance of the overall scheme, which incorporates the proposed clustering and gateway selection algorithms. The results show that the proposed scheme can achieve about 11% higher average throughput, 10% lower end-to-end delay, and 8% lower packet drop fractions compared with the existing scheme.

FAGON: Fake News Detection Model Using Grammatical Transformation on Deep Neural Network

  • Seo, Youngkyung;Han, Seong-Soo;Jeon, You-Boo;Jeong, Chang-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4958-4970
    • /
    • 2019
  • As technology advances, the amount of fake news is increasing more and more by various reasons such as political issues and advertisement exaggeration. However, there have been very few research works on fake news detection, especially which uses grammatical transformation on deep neural network. In this paper, we shall present a new Fake News Detection Model, called FAGON(Fake news detection model using Grammatical transformation On deep Neural network) which determines efficiently if the proposition is true or not for the given article by learning grammatical transformation on neural network. Especially, our model focuses the Korean language. It consists of two modules: sentence generator and classification. The former generates multiple sentences which have the same meaning as the proposition, but with different grammar by training the grammatical transformation. The latter classifies the proposition as true or false by training with vectors generated from each sentence of the article and the multiple sentences obtained from the former model respectively. We shall show that our model is designed to detect fake news effectively by exploiting various grammatical transformation and proper classification structure.

Data Correlation-Based Clustering Algorithm in Wireless Sensor Networks

  • Yeo, Myung-Ho;Seo, Dong-Min;Yoo, Jae-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.331-343
    • /
    • 2009
  • Many types of sensor data exhibit strong correlation in both space and time. Both temporal and spatial suppressions provide opportunities for reducing the energy cost of sensor data collection. Unfortunately, existing clustering algorithms are difficult to utilize the spatial or temporal opportunities, because they just organize clusters based on the distribution of sensor nodes or the network topology but not on the correlation of sensor data. In this paper, we propose a novel clustering algorithm based on the correlation of sensor data. We modify the advertisement sub-phase and TDMA schedule scheme to organize clusters by adjacent sensor nodes which have similar readings. Also, we propose a spatio-temporal suppression scheme for our clustering algorithm. In order to show the superiority of our clustering algorithm, we compare it with the existing suppression algorithms in terms of the lifetime of the sensor network and the size of data which have been collected in the base station. As a result, our experimental results show that the size of data is reduced and the whole network lifetime is prolonged.

A Study of Security Weaknesses of QR Codes and Its Countermeasures (QR 코드의 보안 취약점과 대응 방안 연구)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.83-89
    • /
    • 2012
  • Recently, due to widespread use of smartphones, the number of applications of the QR code is increased rapidly. QR codes, a kind of 2-dimensional barcode, is used to encode information such as simple URLs or namecards, especially for corporates' advertisement. Users can get some information easily by taking picture of the target QR code, however, fake or altered QR codes can cause serious problems, e.g., URL hijacking or infringement of private information because no one can identify the buried information in the QR code by his naked eye. In this paper, I summarize threats to the QR code and present how to tackle these threats.

Analysis of Cosmetics App Smart UI convergence Design in Mobile Environments (모바일 환경에서의 화장품 앱 스마트 UI 융합 디자인 분석)

  • Yeom, Mi-Ryeong;Park, Ju-Ok;Jung, Doo-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.2
    • /
    • pp.13-17
    • /
    • 2016
  • omputer and the Internet (online) services have rapidly been developed and evolved over the last 10 years. They also reduce time and costs in many parts of human life. Yet, a range of adoption and expression has been segmented as a piece of information is diversified. Particularly, while this segmentized information can be integrated according to fields, it is hard for users to aware it at a glance. Therefore, this study aims to improve and analyze programs that have been developed in a variety of ways from the existing unified design of GUI as the UIs of the Internet and programs have become accentuated recently so that it could suggest the importance of user-oriented UI designs.